It is the first mobile ransomware family spotted. Its members usually do not perform encryption or locking, but they make files unusable or hidden until the ransom is payed.
Locker ransomwares can sometimes communicate to a C&C server through Tor.
| Sample | LockDetected | LockStrategy | TextDetected | TextScore | Languages | RW Permission | EncryptionDetected | PhotoCaptureDetected | DeviceAdminUsed | DeviceAdminPolicies | DevAdminFromReflection | Comment | TimedOut | Classified files |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Sample | LockDetected | LockStrategy | TextDetected | TextScore | Languages | RW Permission | EncryptionDetected | PhotoCaptureDetected | DeviceAdminUsed | DeviceAdminPolicies | DevAdminFromReflection | Comment | TimedOut | Classified files |